CN104081311B - For the apparatus and method for the operation for managing mobile device - Google Patents
For the apparatus and method for the operation for managing mobile device Download PDFInfo
- Publication number
- CN104081311B CN104081311B CN201180075925.7A CN201180075925A CN104081311B CN 104081311 B CN104081311 B CN 104081311B CN 201180075925 A CN201180075925 A CN 201180075925A CN 104081311 B CN104081311 B CN 104081311B
- Authority
- CN
- China
- Prior art keywords
- equipment
- interface
- charger
- processor
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Charge And Discharge Circuits For Batteries Or The Like (AREA)
Abstract
A kind of charger includes the first storage region, for storing control software;Charging circuit, for sending electric power by interface;And processor, for generating at least one control signal based on control software.It is used to charge to the battery of the equipment coupled to the interface by the electric power transmitted by interface, and at least one described control signal includes the information of the state for making monitoring operation be executable to determine the equipment.
Description
Technical field
One or more embodiments described herein are related to the operating system or other functions of management electronic equipment.
Background technology
It is connected to smart phone, notebook, media player and other portable sets of network easily quilt
The virus having a negative impact to performance and other agencies are infected.When infecting, equipment must be returned to manufacturer
Or handled to carry out possible reparation by technical staff.If reparation is possible, taken return to equipment can be grasped
Significant data that the behavior of the state of work many times causes to will be stored in internal storage circuit, using and/or other letters
Breath is deleted.For a user, these shortcomings transform into inconvenient and excessive cost.
Brief description of the drawings
Fig. 1 shows the embodiment of the device for control electronics.
Fig. 2 shows the embodiment for the device that be used to control smart phone.
Fig. 3 shows the embodiment of the method for control electronics.
Fig. 4 shows the operation corresponding with monitoring operation.
Fig. 5 shows another embodiment of the device for control electronics.
Embodiment
Fig. 1 shows one embodiment of the device for control electronics 10, and the electronic equipment 10, which has, to be needed again
The battery of charging.The equipment can be smart phone, notebook or laptop computer, personal digital assistant, camera, flat
Plate computer, pad or pod types equipment, media player, or can by or can not be entered by wired or wireless interface and network
The other kinds of personal digital assistant device of row communication.The equipment can also be that the flash memory being attached by appropriate interface drives
Dynamic device or portable or external fixed disk drive.The network can be internet and/or can be to electronic equipment and from electricity
Any other type of sub- equipment transmission data.In order to illustrate, the electronic equipment is shown as smart phone.
The smart phone includes port 20, and the port 20 is operably coupled to the connector in the first end of interface 30
25.The other end of the interface is coupled to the charger that can be taken many forms.A kind of form is charger 40, the charging
Device 40 is equipped with USB port 41 at one end, and it is removably coupled to the plug 42 for being attached to the interface.In opposite end,
Charger 40 can include the arrangement for being suitable for the contact pin 43 of standard wall outlet or other standards power supply, and this can generally be claimed
For " main body ".
Charger 50 can be similar with charger 40, permanently connected except existing between interface 30 and charger.
Charger 60 can be equipped with being operably coupled to the USB interface port 61 of interface 30 notebook or other
The computer or processing equipment of type.In Fig. 1, the interface can be USB interface.However, in other embodiments, the interface
It can be another type, include but is not limited to:Live wire, Serial Advanced Technology Attachment (SATA) type interface, thunder and lightning, Ethernet, pleasure
Appointing in device digital interface (MIDI), general Host Controler Interface (UHCI) or various other wired or wireless style interfaces
What is a kind of.
Fig. 2 shows one embodiment of charger 80 in block diagram form.The charger can be with charger 40 or 50
In any one is corresponding, and according to one embodiment, charger 80 includes charging circuit 81, processor 82, first deposited
Storage area domain 83, and the second storage region 84, such as the memory for storing control software (s/w), the control software (s/w)
For the one or more operations for controlling to be performed by controller.
Charging circuit 81 is coupled to power supply, and the power supply can be that such as wall outlet, automobile or other electronics are fitted
Orchestration or in charger or it is coupled to the battery of charger.Charging circuit can include detector, for detecting phone
10 connection, and based on such detection, can send electric power to charge to telephone cells by interface 30.Charged
The amount of power transmitted in journey can be controlled based on predetermined Managed Solution, be realized by protection circuit and/or software, with
Prevent overcharge and/or the generation of the other types mistake of connected phone may be damaged.
Processor 82 performs the management that can be instructed at least in part by the control software in the first storage region and grasped
Make.These operations include:Monitoring operation, the state for determining phone;One or more recovery operations, for based on the state
To control phone;And/or backup operation, it is for storing data and other information in the phone.These operations will combine Fig. 3
Method discussed in more detail.
Management operation can be performed at the following moment:For example, being connected to charger when phone, being connected in phone
Scheduled time after charger, when receiving trigger signal from phone, and/or when detecting scheduled event.According to one
Embodiment, during being charged to telephone cells, performs all or part of of management operation, so that saturating to user
It is bright.As a result, Telephone Management Agency and charging can occur, for example, when user sleeps or be busy simultaneously.
In other embodiments, completed in charging and phone is still detected after being connected with charger and can held
Row manages all or part of of operation.In these cases, it can postpone to have completed to indicating charging on call screen
Message display, so as to allow to perform it is described management operation.
Once performing, the message and/or other message generated based on the result of management operation can be shown to notify
User and/or one or more selections are asked to user, this will be explained in more detail in discussion below.
In other embodiments, all or part of of management operation can be performed before charging starts.In these feelings
Under condition, charging operations can be postponed before monitoring operation or other one or more management operations have result.Now, from filling
The electric power of the charge power supply of electrical equipment can be used for operating phone.This can provide benefit, if for example, phone is seriously felt
Contaminate or by security threat, from without necessity of charging, because phone needs to be repaired or changed immediately by technician.
Second storage region 84 can be used as the storage for storing the Backup Data received from phone and/or other information
Storehouse.The data and information can be received according to by the management operation of computing device and/or can be based on by phone
The instruction or other orders of framework startup is managed to receive the data and information.The capacity of storage region can less than or equal to
Gigabyte changes in the range of several gigabytes.
Interface 30 includes the multiple signal wires for being used to perform charging and management function for phone.The signal wire can be with
Including:Telephone cells are filled by one or more (n) power lines 31 for electric power to be sent into phone from charger
Electricity;With one or more (m) data and/or control line 32, for bidirectionally transmitted between charger and phone signal with
Perform foregoing management operation.At this point, power line (multiple power lines) be coupled to charging circuit 81 and data and/
Or control line is coupled to processor.
Phone can be operated for example based on any one of several operation systems, the operating system include but
It is not limited to:Apple operating systems, Android operation system, Windows type operation systems, Symbian operating systems,
Blackberry operating systems, the operating system based on Linux, the operating system based on Java, tailored version software and other.
Although equipment 10 is identified as smart phone, equipment 10 can be another type of phone in other embodiments, including
The type of smart phone, the function being for example commonly referred to as now or conventional mobile phone might not be classified as.In addition, setting
Standby 10 can be the another type of equipment that possible be infected by malware, such as E-book reader, panel computer, notebook
Computer, net book and game station.
In Fig. 2, phone 10 is shown as including by citing:Controller 22, for performing operating system software 24 and firmware 25;Deposit
Reservoir 23, for storing the data associated with the use of phone, including contact person, text message and/or application program;And
Charging control circuit 26, for controlling the charging carried out to battery 27 from charger reception electric power.In this arrangement, charge electricity
The line 31 and controller that interface is coupled on road are coupled to the line 32 of interface.
Operating system software is controlled to the execution for dominating the function of the generation operation of phone, and firmware can include
Various monitoring are performed for phone, the fail-safe software (or so-called secure firmware) of operation is safeguarded and repair.The firmware can be with
Including for monitoring and inspection system basic input/output (BIOS), network connection, storage and/or operation with equipment
Related otherwise secure firmware.It can also store except the firmware with safety in addition to especially relevant.
Firmware can be considered as a part for operating system software or can differently store.According to one embodiment,
Interaction between the processor of charger and the operation performed by controller based on equipment firmware can allow or assist to perform
The management operation of charger.
Fig. 3 shows operation included in one embodiment for the method for control electronics, and the electronics is set
It is standby can be it is aforementioned any one.For exemplary purposes, it is assumed that the equipment is the intelligence electricity shown in Fig. 2
Words.This method can be performed by the charger 80 shown in figure.However, in another embodiment, can use different from being somebody's turn to do
The device of charger performs one or more operations of this method.(example combination Fig. 4 of another type of device is begged for
By, wherein, other described devices are corresponding with notebook).
This method includes the connection (block 310) by interface 30 between detection charger 80 and electronic equipment 10.Now, if
Standby can be start, and battery electric quantity is less than or equipment can be shutdown.According to for example passing through the one or more of interface
The voltage or capacitance level on signal and/or one or more signal wires of interface that signal wire is exchanged, (and are set by processor 82
Controller in standby) detect connection.
Once detecting connection, then determine that the power supply of equipment is on or off (block 320) by processor 82.For example, can be with
Signal level on one or more lines based on interface makes the determination by other standards technology.
In one embodiment, if the power supply of equipment is opens, processor 82 to the sending signal of device controller 22 with
Perform reboot operation (block 321).Once signal is received, then basic input-output system of the controller based on such as storage inside
(BIOS) software or other processes for being performed under device operating system control restart the equipment.
If processor 82 determines the power supply of equipment to close, when detecting to be connected to charger, the operation system of equipment
System software or firmware turn on the power and start startup function (block 322).
After starting or restarting, the processor in charger 82 is based on being programmed into one or more of control software 84 bar
Part to perform monitoring operation (block 330) to equipment.One or more conditions can include:To the connection between charger and equipment
Detected, detect connection after reach predetermined time period (for example, being determined by the clock inside processor), for equipment
The state for the charging operations that battery is performed, to the reception of the trigger signal initiated from the equipment (for example, being charged detecting connection
After device or be programmed into operating system software or firmware is transmitted), and/or when detecting some other predetermined events
When.
According to one embodiment, monitoring operation includes:Determine whether equipment has been damaged operating system or had
The one or more viruses for the operation having a negative impact, which infect, whether equipment includes is damaged or infected file, and/
Or whether equipment has been subjected to security threat.Destruction may occur, for example, due to the virus from internet, magnetic or electromagnetism
Interference, physical damage (for example, equipment drops), the internal fault of operating system, the improper installation for updating software, or equipment
Any number of other influences of manufacturing defect and possible damage equipment operation in hardware or operating system.
According to a specific example, equipment can be determined being infected (for example, with one or more impaired
File) but firmware be not infected and in normal condition.According to another example, equipment can be due to firmware failure or damage
And be confirmed as being infected, but be due to the failure or damage agency, to firmware inspection indicate firmware be effective.
With reference to Fig. 4, according to one embodiment, the secure firmware 25 in equipment makes controller 22 be sent out to the processor of charger
Notification signal is sent to indicate that firmware is ready for performing (block 331).Once receiving the signal, cradle processor starts monitoring
Function, for example, consider following it is assumed that the equipment connected is new equipment.
Monitoring operation can include from the processor of charger to device controller sending signal, to ask device controller
To perform security sweep or other processes so that it is determined that the state (block 332) of equipment.Based on the signal received or according to one
Other a little determinations, the controller of the equipment performs scanning/process (block 333).
According to one embodiment, security sweep/process can perform the school of file including the use of MBR (MBR)
Test and operate.MBR can include the partition table for describing the memory cell subregion of equipment, and the memory cell of the equipment can be wrapped
Memory 23 and/or other one or more internal storages are included, other one or more of internal storages include multiple
Any one in read-only and/or random access memory.Scan the file in each subregion with determine they state and
If there is being damaged or infected file, it can be identified.According to one embodiment, such as Microsoft can be used
File verification and completeness check program (FCIV) instrument safeguard the database of signature.The signature can be stored in charging
Device, equipment or the two in.
Except performing verification with function or as the replacement for performing verification and function, the secure firmware of equipment can be performed
Other kinds of security sweep.Example includes:Test for determining sector or region bad in internal storage;For positioning
Wrong test in operating system software, firmware or file;Boundary scan testing;Register Scan;Interior kernel analysis and for fixed
Position Malware, Trojan Horse, cookie, virus, spam, worm, root kits process, and/or for positioning
The test of other kinds of pollution agency, the pollution agency includes the pollution generation for being used to damage data and other types file
Reason.
Once verification and operation and/or security sweep/process are completed, it as a result will be sent to and filled by controller by interface
The processor (block 334) of electrical equipment.For example, this can use correspondence or similar to the credible execution skill inside Intel's Vpro frameworks
The mode of art (TXT) function is realized, if can be using such framework in equipment.If it is not possible, can then be based on setting
The compatible technology of standby operating environment sends result using another hardware and/or software.
The processor of charger determines the state (block 335) of equipment based on result.If for example, do not had by secure firmware
Problem is navigated to, then the state that equipment has had can be determined, for example, in suitable operating environment.Otherwise, can be with base
Environment that is vulnerable or damaging is in the state that equipment is determined by which problem of Scan orientation.
Fig. 3 is returned to, if state is not good enough, the processor of charger can send control of the backup signal to equipment
Device.Backup signal can be backed up (block with instruction equipment controller to data, file and the other information of storage in a device
340).In response to backup signal, file, data and/or other information (can be stored in memory 23 by the controller of equipment
And/or in other interior locations) send to charger to be stored in storage region 83.It can for example be based on being included in backup letter
Firmware in information, equipment or operating system software or combination in number, come determine to be backed up specific data,
File and information.(at this moment perform the backup operation.As will be explained, backup operation can be after restorer be attempted
Perform, as will be described).
After the state of equipment is determined, the processor of charger can send controller of the activation signal to equipment.Should
Activation signal can perform one or more recovery operations (block 350) with instruction equipment controller.It is preprogrammed into equipment firmware
Or these operations in software or cradle processor can retrieve the software for performing recovery operation from memory 84
To be delivered to equipment by interface.
The recovery operation to be performed be based on the scanning/process performed by equipment safety firmware found it is certain types of
The recovery operation of problem.For example, recovery operation can include file access pattern function, the file access pattern function includes:To having deleted
File in the file removed or bad sector in memory or region is recovered, the file damaged is recovered,
Deleted with the file to having damaged.Any one of many file rescue plus and software can be used extensive to perform
It is multiple.It can also carry out recovery operation and equipment returned into previously positioned or acceptable state, for example, similar to for computer
Or the mode that the system performed by other equipment is recovered.
Attempt after recovering, based on the signal of the internal firmware transmission from cradle processor and/or equipment, that is initiated can
The backup operation of choosing can be performed to backup to data, file and/or other information in the storage region of charger.Because
Equipment is confirmed as not working completely or partially, and recovery operation fails equipment returning to kilter or if recovery operation
Failure, then can access the content of the second storage region 84 later.
Perform after recovery operation, device controller can make presentation of information on the screen of the device.Information can provide example
The instruction (block 360) for the result that monitoring as performed in equipment is operated.These results can include for example being performed by secure firmware
Security sweep/process result.According to one embodiment, one in following message can be shown on device screen:
State
Do not pinpoint the problems
It was found that seeming believable change
Safety may be jeopardized
In response to second or the 3rd message display, user can be in response to shown state from the control dish of display
One (block 370) in multiple options is selected in list.Perform one in following act:
Shutdown
Start (acquiescence, if user only pulls up equipment from interface)
Call the telephone number upgraded for automatic software
Backup Data in charger is delivered to website storage
To network delivery notification message
Call center is called to be repaired
According to one embodiment, foregoing monitoring, recovery or backup operation are performed during being charged to telephone cells
In all or part of.As a result, Telephone Management Agency and charging can occur, for example, when user sleep soundly or be busy simultaneously.
Alternatively, it is possible to battery charging start before or battery charging completed after perform these operation in
All or part of.If before battery charging starts, the controller of equipment can be powered by charger without
Device battery is charged.
This method can also include multiple additional or optional operation.For example, for performing security sweep to determine electricity
The monitoring operation of speech phase can be performed before formal start-up operation is performed.This can be by being powered to hold to controller
Row scanning is realized without enabled systems BIOS.Then, can be at least for quilt based on the state of the equipment determined by scanning
It is determined that being uninfected by or the part of equipment with excellent operation state or subsystem perform start-up operation.
The example of these parts or subsystem includes core kernel, device driver, system service (for example, demons)
And application program.If core kernel is by checking, it can optionally be activated.However, this can be prevented certain
Under the conditions of the other parts of operating system or other software be loaded, run and/or access.For example, testing core kernel
Card may allow equipment to start, but such as the application program of equipment camera driver etc may not then work, until driving
Dynamic device software (or relevant portion of operating system software) can be resumed or repair.
This selective startup can be performed based on the control signal from cradle processor, or can be with
Operating system software or firmware based on equipment are performed automatically.
Except foregoing monitoring and recovery operation, the operating system of equipment can have hook in its file system, should
Hook is used as recognizing and/or intercepts the basis for the request for opening file.This can be used for setting up listed files with whole
Individual equipment is used when being activated.Then filename and signature and data in file attribute can be sent to the processing of charger
Device.
Equally, the request for opening file can be merely deferred until that signature is electrically charged device checking, but then can be as early as possible
Continue, so that avoid the time that alarm clock and miscellaneous part are disabled is longer than a bit of time, such as several seconds.
Equally, after monitoring operation is performed but before recovery generation, the processor of power manager and/or the behaviour of equipment
The message for giving the option how user performs recovery can be shown by making system software/firmware.For example, the message can be in charging
Period or charging are shown before or after performing.The message can include the option list being listed below.Be then based on by
The selection that user makes performs recovery operation, including or does not include previously and/or backup operation afterwards.
Recover option
Recover to recovery point
1) it is nearest
2) selected from list
Recover to factory default setting
Fig. 5 shows another embodiment of the device for control electronics.In this embodiment, interface and electronics are set
It is standby to be any types and be configured in a similar manner to the embodiments described above.But, power manager 200 is to calculate
Machine, it can be desktop computer or portable computer, such as notebook, panel computer or other computing devices.
Computer includes being used for the port 61 coupled to interface 30.The control software of storage in a computer is performed similarly to
The operation of processor in Fig. 2 power manager and additional operations.For example, backup operation can be performed, the backup behaviour
Work is related to the data for receiving slave unit, file and other information and is delivered to network storage location, the network storage location bag
Include but be not limited to:The server and/or cloud-type storage region of the wireless service provider of equipment or other be located at long-range deposit
Storage area domain.If equipment is infected or safety is on the hazard, then Backup Data can be accessed to allow equipment extensive later
The multiple data.
According to another embodiment, non-emporary computer-readable medium stores the journey for controlling all any equipment as the aforementioned
Sequence.Storage medium can be internal read-only or random access memory or another type of memory, and program then includes being used for
Perform the code of the operation of method described herein.
Except the charger shown in Fig. 1, according to another embodiment, charger can include charging to the battery of equipment
The used internal cell of its own.For example, for help traveller or those not in oneself office or the people of family, this
The embodiment of sample will may be useful for.
The specific feature, the structure that all show to combine that the embodiment is described are referred to any of " embodiment " in this specification
Or during characteristic is included at least one embodiment of the present invention.Such phrase that diverse location occurs in specification, which differs, establishes a capital
Refer to same embodiment.Further, should when specific feature, structure or characteristic are described with reference to any embodiment
Think that it is within the visual field of those skilled in the art that such feature, structure or characteristic are completed with reference to other embodiment.
Equally, the feature of any one embodiment described herein can be combined with the feature of one or more other embodiments with
Form additional embodiment.
Further, in order to be readily appreciated that, some functional modules can be depicted as single module;However, these lists
The module solely described is explained not necessarily in the order for being discussed herein or presenting.For example, some modules can simultaneously, with not
Same order etc. is performed.
Although herein with reference to multiple exemplary embodiments, invention has been described it should be appreciated that this
The various other modifications and embodiment that the technical staff in field can design will be fallen into spirit and scope.More
Especially, in the range of foregoing disclose, accompanying drawing and appended claims, to theme combine arrangement component parts and/
Or it is possible that arrangement, which carries out rational variants and modifications, without departing from the spirit of the present invention.Except component parts and/or cloth
Variants and modifications in putting, to those skilled in the art, alternative purposes are also obvious.
Claims (12)
1. a kind of charger, including:
First storage region, for storing control software;
Charging circuit, for sending electric power by interface;And
Processor, for generating at least one control signal based on the control software,
Wherein, the electric power sent by the interface is used to charge to the battery of the equipment coupled to the interface, and
Wherein, at least one described control signal includes make it that monitoring operation is performed to determine the shape of the equipment based on security sweep
The information of state, wherein in response to the state of the identified equipment, the processor provide backup signal to the equipment with
Request provides Backup Data to the charger from the equipment;And
Second storage region, for storing the Backup Data from the equipment by the interface, the backup number
Received according to while the equipment is charged by the charger, wherein after the state of the equipment is determined, institute
Processor is stated to provide another control signal to the equipment, when the equipment is charged by the charger, to set described
Standby place performs recovery operation simultaneously, and another control signal is by institute after the monitoring operation is performed and in the equipment
The equipment is sent to when stating charger charging.
2. charger as claimed in claim 1, wherein, the monitoring operation include to storage in the apparatus one or
Multiple files perform the security sweep.
3. charger as claimed in claim 1, wherein, the processor by the interface from the equipment receive information,
And the instruction for the state that the information wherein, received provides the equipment based on the monitoring operation.
4. charger as claimed in claim 1, wherein, the state determined and mistake in the equipment are operated by the monitoring
Appearance corresponding by mistake.
5. charger as claimed in claim 4, wherein, in wrong file, data or the software with the equipment
The pollution of at least one is corresponding.
6. charger as claimed in claim 5, wherein, the bad sector of the pollution from storage medium, viral or another dirt
Contaminate at least one in agency.
7. charger as claimed in claim 1, wherein, at least one described control signal is sent to institute by the interface
Equipment is stated, is used to charge to the battery while electric power is sent to the equipment by the interface.
8. charger as claimed in claim 1, wherein, the interface is USB (USB) interface.
9. charger as claimed in claim 1, further comprises:
Port, for removedly receiving the connector coupled with the interface.
10. a kind of portable computer, including:
The display of the portable computer;
First storage region, for storing control software;
Charging circuit, for sending electric power by interface;And
Processor, for generating at least one control signal based on the control software,
Wherein, the electric power sent by the interface is used to charge to the battery of the equipment coupled to the interface, and
Wherein, at least one described control signal includes make it that monitoring operation is performed to determine the shape of the equipment based on security sweep
The information of state, wherein in response to the state of the identified equipment, the processor provide backup signal to the equipment with
Request provides Backup Data to the portable computer from the equipment;And
Second storage region, for storing the Backup Data from the equipment by the interface, the Backup Data is
Received while the equipment is charged by the charging circuit, wherein the processor provides another control signal to institute
Equipment is stated to cause when the equipment is charged by the portable computer, recovery operation is performed simultaneously in the apparatus,
Another control signal is after the monitoring operation is performed and when being charged in the equipment by the portable computer
It is sent to the equipment.
11. portable computer as claimed in claim 10, wherein, the monitoring operation is included to storage in the apparatus
One or more files perform the security sweep.
12. portable computer as claimed in claim 10, wherein:
The processor by the interface from the equipment receive information,
The instruction for the state that described information provides the equipment based on the monitoring operation, and
The state is corresponding with appearance wrong in the equipment.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2011/068073 WO2013101176A1 (en) | 2011-12-30 | 2011-12-30 | Apparatus and method for managing operation of a mobile device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104081311A CN104081311A (en) | 2014-10-01 |
CN104081311B true CN104081311B (en) | 2017-07-18 |
Family
ID=48698410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201180075925.7A Expired - Fee Related CN104081311B (en) | 2011-12-30 | 2011-12-30 | For the apparatus and method for the operation for managing mobile device |
Country Status (4)
Country | Link |
---|---|
US (1) | US9594899B2 (en) |
EP (1) | EP2798428B1 (en) |
CN (1) | CN104081311B (en) |
WO (1) | WO2013101176A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104081311B (en) | 2011-12-30 | 2017-07-18 | 英特尔公司 | For the apparatus and method for the operation for managing mobile device |
CN104980564A (en) * | 2014-04-09 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Recharge socket and mobile terminal processing method based on recharge socket |
CN105278975A (en) * | 2014-07-04 | 2016-01-27 | 北京奇虎科技有限公司 | Power adapter as well as drive program and operating system installation method |
CN105389225A (en) * | 2015-11-25 | 2016-03-09 | 小米科技有限责任公司 | Touch screen reporting point processing method and apparatus |
CN109863475A (en) * | 2017-10-09 | 2019-06-07 | 华为技术有限公司 | The upgrade method and relevant device of a kind of application in safety element |
US10956563B2 (en) * | 2017-11-22 | 2021-03-23 | Aqua Security Software, Ltd. | System for securing software containers with embedded agent |
CN113597721A (en) * | 2019-02-25 | 2021-11-02 | 美国斯耐普公司 | Charging cable with charging state indication |
US20240386107A1 (en) * | 2021-05-11 | 2024-11-21 | B.G. Negev Technologies And Applications Ltd., At Ben-Gurion University | A computerized charging/interface device with malware detection and backup capabilities |
WO2023058027A1 (en) * | 2021-10-10 | 2023-04-13 | B.G. Negev Technologies And Applications Ltd., At Ben-Gurion University | A computerized charging/interface device with application marketplace and ecosystem capabilities |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101341491A (en) * | 2005-12-20 | 2009-01-07 | 西姆毕恩软件有限公司 | Malicious software detection in a computing device |
CN102097832A (en) * | 2010-10-27 | 2011-06-15 | 国家电网公司 | Charging and battery replacing monitoring system and method based on internet of things |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3217007B2 (en) * | 1997-02-24 | 2001-10-09 | 埼玉日本電気株式会社 | Mobile phone device with security function |
US6664760B2 (en) * | 2001-11-23 | 2003-12-16 | God Co., Ltd. | Cellular phone charger with data backup function and cellular phone data backup device |
FI20020570A0 (en) * | 2002-03-25 | 2002-03-25 | Nokia Corp | Time division of tasks on a mobile phone |
US20050253554A1 (en) * | 2004-05-14 | 2005-11-17 | Interdigital Technology Corporation | Apparatus for backing up data stored in a portable device |
US7591018B1 (en) * | 2004-09-14 | 2009-09-15 | Trend Micro Incorporated | Portable antivirus device with solid state memory |
US20060158154A1 (en) * | 2005-01-18 | 2006-07-20 | Maurilus Jean R | Method and apparatus for backing up data from cell phones and other hand-held devices |
US8086281B2 (en) | 2007-01-06 | 2011-12-27 | Apple Inc. | Apparatuses and methods that facilitate the transfer of power and information among electrical devices |
US20070096685A1 (en) * | 2005-10-28 | 2007-05-03 | Q - Dog Ab, | Apparatus for charging handheld units |
JP4833224B2 (en) * | 2005-12-09 | 2011-12-07 | パナソニック株式会社 | Information communication terminal device and automatic backup system including the device |
TW200725271A (en) * | 2005-12-27 | 2007-07-01 | Inventec Appliances Corp | Battery charger capable of backing up information of a mobile phone and method thereof |
US7966500B2 (en) | 2006-02-21 | 2011-06-21 | Jeremiah Emmett Martilik | Remote connecting and shielding power supply system |
US7975304B2 (en) * | 2006-04-28 | 2011-07-05 | Trend Micro Incorporated | Portable storage device with stand-alone antivirus capability |
US8725924B2 (en) * | 2006-06-01 | 2014-05-13 | Clevx, Llc | Information backup system with storing mechanism and method of operation thereof |
US20100011442A1 (en) * | 2008-07-09 | 2010-01-14 | Sumwintek Corp. | Data security device for preventing the spreading of malware |
US8631488B2 (en) * | 2008-08-04 | 2014-01-14 | Cupp Computing As | Systems and methods for providing security services during power management mode |
JP5321277B2 (en) * | 2009-06-19 | 2013-10-23 | 富士通株式会社 | Terminal device, setting notification system, notification method |
US8922329B2 (en) * | 2009-07-23 | 2014-12-30 | Qualcomm Incorporated | Battery charging to extend battery life and improve efficiency |
US8910288B2 (en) * | 2010-02-05 | 2014-12-09 | Leidos, Inc | Network managed antivirus appliance |
US20110300906A1 (en) * | 2010-06-02 | 2011-12-08 | Colgan Joseph G | Multi-Function Cell Phone Charger Apparatus |
US20120272320A1 (en) * | 2011-04-25 | 2012-10-25 | Verizon Patent And Licensing Inc. | Method and system for providing mobile device scanning |
US9152202B2 (en) * | 2011-06-16 | 2015-10-06 | Microsoft Technology Licensing, Llc | Mobile device operations with battery optimization |
US11392708B2 (en) * | 2011-08-05 | 2022-07-19 | Harris Corporation | Method and system for embedding security in a mobile communications device |
US8584243B2 (en) * | 2011-11-09 | 2013-11-12 | Kaprica Security, Inc. | System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner |
CN104081311B (en) | 2011-12-30 | 2017-07-18 | 英特尔公司 | For the apparatus and method for the operation for managing mobile device |
-
2011
- 2011-12-30 CN CN201180075925.7A patent/CN104081311B/en not_active Expired - Fee Related
- 2011-12-30 US US14/006,572 patent/US9594899B2/en active Active
- 2011-12-30 WO PCT/US2011/068073 patent/WO2013101176A1/en active Application Filing
- 2011-12-30 EP EP11878831.4A patent/EP2798428B1/en not_active Not-in-force
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101341491A (en) * | 2005-12-20 | 2009-01-07 | 西姆毕恩软件有限公司 | Malicious software detection in a computing device |
CN102097832A (en) * | 2010-10-27 | 2011-06-15 | 国家电网公司 | Charging and battery replacing monitoring system and method based on internet of things |
Also Published As
Publication number | Publication date |
---|---|
CN104081311A (en) | 2014-10-01 |
EP2798428B1 (en) | 2018-09-12 |
US20140013428A1 (en) | 2014-01-09 |
US9594899B2 (en) | 2017-03-14 |
WO2013101176A1 (en) | 2013-07-04 |
EP2798428A4 (en) | 2015-08-12 |
EP2798428A1 (en) | 2014-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104081311B (en) | For the apparatus and method for the operation for managing mobile device | |
CN106598635B (en) | Recovery method of baseboard management controller and baseboard management controller | |
CN103207975B (en) | The method of protection password and computing machine | |
CN105144074B (en) | It is stored using the block of hybrid memory device | |
TWI362588B (en) | Monitor apparatus, a monitoring method thereof and computer apparatus therewith | |
TW201502790A (en) | Redundant system boot code in a secondary non-volatile memory | |
CN104899055A (en) | BIOS control based ME updating system and updating method thereof | |
CN111694760B (en) | Server system, flash memory module and method for updating firmware mapping file | |
CN109933182A (en) | A method, device and system for diagnosing power failure of a server | |
US10275330B2 (en) | Computer readable non-transitory recording medium storing pseudo failure generation program, generation method, and generation apparatus | |
CN111984490A (en) | Warning device, method, equipment and medium for illegal operating system starting item | |
CN117055822B (en) | NVME SSD Raid card board power-carrying system and control method | |
CN109783390A (en) | PSU firmware upgrade and upgrade stability test method, device, terminal and storage medium | |
CN112231140A (en) | Method, system, terminal and storage medium for fault recovery of BMC (baseboard management controller) of storage device | |
WO2024119787A1 (en) | Method and apparatus for amd server system installation power-off processing, device and medium | |
CN111367700A (en) | A forced recovery method, system and related components after BMC is down | |
CN114816481B (en) | Firmware batch upgrading method, device, equipment and storage medium | |
CN116893922A (en) | A method and device for powering on a server with a PCIe expansion board | |
JP5223688B2 (en) | Uninterruptible power supply management device and management method | |
CN110798347B (en) | Service state detection method, device, equipment and storage medium | |
US11281764B2 (en) | Safe battery authentication | |
CN115048147A (en) | Firmware upgrading method, device, equipment and storage medium | |
CN114490200A (en) | Memory test method and device, computer equipment and storage medium | |
CN114153503A (en) | A BIOS control method, device and medium | |
CN111400076B (en) | Downtime restoration method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170718 Termination date: 20191230 |
|
CF01 | Termination of patent right due to non-payment of annual fee |